Analysis
-
max time kernel
18s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-08-2024 21:43
Static task
static1
Behavioral task
behavioral1
Sample
20628e9a792a65fcf80079aff96ec0e0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
20628e9a792a65fcf80079aff96ec0e0N.exe
Resource
win10v2004-20240802-en
General
-
Target
20628e9a792a65fcf80079aff96ec0e0N.exe
-
Size
4.9MB
-
MD5
20628e9a792a65fcf80079aff96ec0e0
-
SHA1
ed0c7d704e767354615748ef958b84f070d3ca8d
-
SHA256
9a9d319b7e493f58e77a693d2a78737667962fe2d7023798ad0a7cce8e6e473e
-
SHA512
689f39e38ed162ddeba0fa4ec39d033c1d76896b78fc8ae5a2f3c517306e2f2531bdc765fd7768d9f5ca08682f12d67870558c004969f2daf85b06829555f2f3
-
SSDEEP
49152:WbF+ZpLwn4PGaUFC6Ymr2c78S1/mPXlxQ7jkGtpF5tLVPElqX0RFCfBQK3kEdToN:WbF+HwnrC63r2f+r+I/431vGy
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4120 MSWDM.EXE -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" 20628e9a792a65fcf80079aff96ec0e0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" 20628e9a792a65fcf80079aff96ec0e0N.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\WINDOWS\MSWDM.EXE 20628e9a792a65fcf80079aff96ec0e0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20628e9a792a65fcf80079aff96ec0e0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSWDM.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4704 wrote to memory of 4120 4704 20628e9a792a65fcf80079aff96ec0e0N.exe 85 PID 4704 wrote to memory of 4120 4704 20628e9a792a65fcf80079aff96ec0e0N.exe 85 PID 4704 wrote to memory of 4120 4704 20628e9a792a65fcf80079aff96ec0e0N.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\20628e9a792a65fcf80079aff96ec0e0N.exe"C:\Users\Admin\AppData\Local\Temp\20628e9a792a65fcf80079aff96ec0e0N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4120
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.9MB
MD520628e9a792a65fcf80079aff96ec0e0
SHA1ed0c7d704e767354615748ef958b84f070d3ca8d
SHA2569a9d319b7e493f58e77a693d2a78737667962fe2d7023798ad0a7cce8e6e473e
SHA512689f39e38ed162ddeba0fa4ec39d033c1d76896b78fc8ae5a2f3c517306e2f2531bdc765fd7768d9f5ca08682f12d67870558c004969f2daf85b06829555f2f3